Skip to main content

LulzSec now taking phone requests for DDoS attacks

lulzsec-tupac-pbsUPDATE: The CIA’s website currently appears to be down and LulzSec has claimed responsibility via Twitter.

Lulz Security , better known as LulzSec, the unscrupulous hacker group whose targets have ranged from porn sites to PBS, is now taking requests over the phone. In a tweet posted yesterday, LulzSec unveiled a phone number where people could call in and leave the name of a target website. If LulzSec approved, it was suggested that the hacktivist group would then initiate a distributed denial of service (DDoS) attack to render the site inaccessible.

“Call into 614-LULZSEC and pick a target and we’ll obliterate it. Nobody wants to mess with The Lulz Cannon – take aim for us, twitter,” read LulzSec’s tweet. The number’s area code points to the Colombus, Ohio area, however, it’s not at all likely that any members of LulzSec are actually based there. Throughout the day today, the group’s Twitter feed has many several mentions of the hotline number, encouraging followers to call in with requests.

We called the number (but didn’t leave a message, obviously) and were greeted by a voicemail message spoken by a “Pierre Dubois” in a French accent of questionable authenticity. LulzSec has claimed that it took down a total of eight websites handpicked by its followers on the first day of the hotline’s existence. LulzSec also boasted that the number has received over 5,000 missed calls and taken in some 2,500 voicemail messages.

LulzSec’s decision to field DDoS requests over the phone may at first seem like an open invitation to be cornered by the authorities. But, in age where anyone can establish a Google Voice number, it’s also likely that a voicemail system is likely just as secure than most methods possible through the Internet. LulzSec hasn’t said if the hotline will become a permanent fixture in the group’s ongoing quest for “maximum lulz.”

Editors' Recommendations

Aemon Malone
Former Digital Trends Contributor
Microsoft stopped the largest DDoS attack ever reported
Nvidia T4 Enterprise Server Wall

Distributed Denial-of-Service (DDoS) attacks have become more common, and Microsoft recently published a blog post looking into the trends for such attacks on its own servers. In that post, the company says that, at one point, it stopped one of the largest-ever-recorded DDoS attacks on a Microsoft Azure server in Asia.

According to Microsoft's data, in November, an unnamed Azure customer in Asia was targeted with a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps.) The attack came from 10,000 sources from multiple countries across the globe, including China, South Korea, Russia, Iran, and Taiwan. The attack itself lasted 15 minutes. Yet it is not the first one of such scale, as there were two additional attacks, one of 3.25 Tbps and another of 2.55 Tbps in December in Asia.

Read more
Cloudflare reports a massive 175% increase in DDoS attacks
Person using laptop with security graphics in front.

Cloudflare, a web infrastructure and security company, has just released a report titled "DDoS Attack Trends for Q4 2021." According to Cloudflare, 2021 has been a particularly bad year in terms of DDoS attacks.

Ransom distributed denial of service (DDoS) attacks increased by over 175 percent quarter over quarter, highlighting the large scale of the problem described by Cloudflare.

Read more
Black Lives Matter website hit by more than 100 DDoS attacks in seven months
black lives matter ddos attacks attack oct 21v2

New data published this week demonstrates the scale and scope of cyber-attacks launched against the official website for the Black Lives Matter movement. Over the course of seven months in 2016, more than 100 distributed denial-of-service (DDoS) attacks were leveled against the site, with the intention of making it inaccessible to visitors.

DDoS mitigation service Deflect Labs was called upon to help the organization respond to these attacks, and today the company published a report spanning from April to October. Attacks began to grow in size and frequency in July, followed by another substantial increase in September and October, according to a report from Motherboard.

Read more